Upgrade to remove ads
Lesson 29 Studyguide
Terms in this set (33)
Criminal act committed through the use of a computer/getting into someone else's system and changing information or creating a computer virus and causing damage to other's information.
Manipulation of a computer or computer data to obtain money, property, or value dishonestly or to cause loss.
Biometric security measures
The measuring and analysis of such physical attributes as facial features and voice or retinal scans.
Act of changing data before it is entered in the computer or after it has been entered.
Use a computer to gain unauthorized access to data in a system.
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Computer virus triggered by the appearance or disappearance of specified data.
The illegal copying or use of computer criterion.
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
Computer virus that does something different from what it is expected to do.
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks.
Thou shalt not use a computer to ___ other people.
Thou shalt not _____ with other people's computer work.
Thou shalt not ____ ____ in other people's computer files.
Thou shalt not use a computer to ____.
Thou shalt not use a computer to bear ____ _____.
Thou shalt not copy or use ______ software for which you have not paid.
Thou shalt not use other people's computer resources without ________or proper compensation.
Thou shalt not appropriate other people's ______ _____.
Thou shalt think about the social _______ of the program you are writing or the system you are designing.
Thou shalt always use a computer in ways that ensure _______ and _____ for your fellow humans.
The person being perpetrated. Taylor was the target because she was being bullied throughout the whole movie.
The person watching everything happen and does nothing to help. Scott was a bystander because he allowed Lindsay and her friends to attack Taylor.
The person who is attacking/bullying. Lindsay is an offender because she and her friends bullied Taylor in the movie.
The person who helps to stop the bullying and defends the target. Taylor's mom was an upstander because she stood by Taylor's side and helped her get through these times.
Electronic device that receives, processes, and stores data and produces a result.
Hardware, software, and data working together.
Information entered into the computer to be processed that consists of text, numbers, sounds, and images.
The tangible, physical equipment that can be seen and touched.
The largest network used as a communication tool.
Intangible set of instructions that tells the computer what to do.
Sets with similar terms
MDL Computer Security and Privacy
Computer Safety and Privacy
Other Quizlet sets
19. die nationalsozialistische ideologie
More True or False Math 221
Analysis Final Study Guide